Smart Phone Battery Uses for Spy Purposes

Texas, The battery of your smart phone can reveal your secrets easily and it can be noted by viewing the level of energy being used in the battery and what is written on the phone and what has been read over it.

According to experts of banking, if a small micro controller is added with the battery of the phone, you can note the current of the battery of the phone, which is created by each activity and even that typing any word. After that you can find the flow of current with the use of artificial intelligence what buttons of words are pressed. The addresses of the websites, passwords and the time of use of camera and details can be found.

battries smart phones

The security experts of University of Texas, Aston and Hebrew University wrote in their fresh research thesis that the hackers can find maximum from the smart phone battery. They said that the smart batteries are inserted in the latest phones and you can find the consumption and the capacity of the battery. There are different apps, which also tell the performance of battery, which is possible due to smart battery.

Battry

When the micro controller is added with the battery or you can change the simple battery with the micro controller battery or e-battery, then the mysterious spy battery can not the flow of current up to 1K Hz. With its use, you can note every activity being watched, written and read on the phone because electricity is used in each activity and its features can reveal the secrets. After that you can use the artificial intelligence and you can know different passwords and typed words and other activities.

battries smart phones

The hackers have given it the poison battery in which the graph of energy is made and then a software reveals its result. The experts wrote in a research thesis that the attack of hackers on the battery is possible. This is the less expensive and very easy process and they need simple diagram of the use of the battery. The experts warned that the security departments should take necessary initiatives to tackle this way of attack because the data can be achieved from the phone scanning on the airport, electronics repair workshop and from other places.